Recherche Images Maps Play YouTube Actualités Gmail Drive Plus »
Connexion
Les utilisateurs de lecteurs d'écran peuvent cliquer sur ce lien pour activer le mode d'accessibilité. Celui-ci propose les mêmes fonctionnalités principales, mais il est optimisé pour votre lecteur d'écran.

Brevets

  1. Recherche avancée dans les brevets
Numéro de publicationUS20080086719 A1
Type de publicationDemande
Numéro de demandeUS 11/867,029
Date de publication10 avr. 2008
Date de dépôt4 oct. 2007
Date de priorité6 oct. 2006
Autre référence de publicationDE602006012492D1, EP1909173A1, EP1909173B1, US8230394
Numéro de publication11867029, 867029, US 2008/0086719 A1, US 2008/086719 A1, US 20080086719 A1, US 20080086719A1, US 2008086719 A1, US 2008086719A1, US-A1-20080086719, US-A1-2008086719, US2008/0086719A1, US2008/086719A1, US20080086719 A1, US20080086719A1, US2008086719 A1, US2008086719A1
InventeursMatthieu Clemenceau, Emmanuel Ledoux, Stephane Durand
Cessionnaire d'origineMatthieu Clemenceau, Emmanuel Ledoux, Stephane Durand
Exporter la citationBiBTeX, EndNote, RefMan
Liens externes: USPTO, Cession USPTO, Espacenet
Management of data of settings in an operating system of a computer entity
US 20080086719 A1
Résumé
The invention is related to the management of settings data in an operating system of a computer entity. The operating system includes sets of specific instructions (30-33), such as plugins, for managing configurations of software components (35) intended to run on the computer entity. A modification of settings required by an external program (20,21) thus involves a modification of configuration of the software components (35), through related plugins (30-33). The operating system according to the invention is architected so as to include a repository (40,41) storing data of settings, and a main program (10) having access to the repository in read and write modes. Upon request from an external program for modifying settings, the main program (10) is adapted for transmitting the request to the plugins, receiving from at least one plugin a response including an information of modification of settings required by the external program, and, upon verification of the information, validating the modification of settings and updating related data in said repository.
Images(3)
Previous page
Next page
Revendications(19)
1. A method for managing data of settings in an operating system of a computer entity,
wherein said operating system includes sets of specific instructions for managing configurations of software components intended to run on said computer entity,
a modification of settings required by an external program involving a modification of a configuration of said software components, through related sets of specific instructions,
and wherein:
a repository storing data of settings, and a main program having access to said repository in read and write modes, are provided,
and, upon request from an external program for modifying settings, said main program is adapted for:
transmitting said request to said sets of specific instructions,
receiving from at least one of said set of specific instructions a response including an information of modification of settings required by said external program,
upon verification of said information based on at least one criterion, validating said modification of settings and updating related data in said repository.
2. The method as set forth in claim 1, wherein said at least one criterion is whether said information has a correct type of data.
3. The method as set forth in claim 2, wherein a further verification is performed on the request itself and comprises a test of regular expression of the request.
4. The method as set forth in claim 1, wherein said main program has an exclusive access to said repository.
5. The method as set forth in claim 1, wherein a plurality of external programs require modifications of common settings and said main program is further adapted for notifying to said plurality of external programs changes in common parts of the repository.
6. The method as set forth in claim 1, wherein said main program comprises a server program adapted for reading and/or writing data in said repository, while said external programs act as client programs.
7. The method as set forth in claim 6, wherein said main program comprises an application program interface for providing an interface between said client programs and said server program.
8. The method as set forth in claim 7, wherein said application program interface includes a list of commands related at least to the repository reading and writing.
9. The method as set forth in claim 8, wherein a buffer is further provided for temporarily storing modification of settings data, and said commands include:
a confirmation for storing data of said buffer in the repository,
and a rollback command.
10. The method as set forth in claim 6, to wherein said server program comprises a daemon type program, and each of said sets of specific instructions defines a plugin type program cooperating with the daemon.
11. The method as set forth in claim 10, wherein the daemon is adapted for:
broadcasting said request from said external program to said plugins, and
receiving, from at least one appropriate plugin related to said request, a response including information of modification of settings required in said request.
12. The method as set forth in claim 1, wherein a set of specific instructions, adapted for cooperating with said main program, is further provided for managing changes in said repository.
13. The method as set forth in claim 1, wherein a predetermined set of settings is further provided with said sets of specific instructions for defining default settings of said software components.
14. The method as set forth in claim 1, wherein the operating system is a LINUX® type operating system, and wherein a single repository of settings is further provided for storing all the settings of said software components, making it possible to manage an equivalent of a registry of settings in such a LINUX® type operating system.
15. The method as set forth in claim 1, wherein said repository is an XML file.
16. The method as set forth in claim 1, wherein at least a part of said repository includes settings preferred by a first identified user of the computer entity, and access to said part of said repository is disabled for a second user different from said first identified user.
17. The method as set forth in claim 16, wherein said part of said repository is stored in a non-volatile memory of said computer entity, and at least current settings of computer entity components are stored in a volatile memory.
18. A computer program containing instructions for implementation of a method for managing data of settings in an operating system of a computer entity,
wherein said operating system includes sets of specific instructions for managing configurations of software components intended to run on said computer entity,
a modification of settings required by an external program involving a modification of a configuration of said software components, through related sets of specific instructions,
and wherein:
a repository storing data of settings, and a main program having access to said repository in read and write modes, are provided,
and, upon request from an external program for modifying settings, said main program is adapted for:
transmitting said request to said sets of specific instructions,
receiving from at least one of said set of specific instructions a response including an information of modification of settings required by said external program,
upon verification of said information based on at least one criterion, validating said modification of settings and updating related data in said repository.
19. The computer program of claim 18, wherein the instructions are stored on a data storing medium.
Description
  • [0001]
    The present invention is related to the management of an operating system of a computer entity, and more particularly to the management of data of settings of such an operating system.
  • [0002]
    An operating system comprises several independent software components. These software components are in charge of:
      • managing the computer entity hardware, and
      • managing the computer entity network services and/or providing high level user interface programs.
  • [0005]
    Most of these software components have their own settings and own running behaviours. Usually, the software component settings are stored in a standard text file. Some of these software components may provide a graphical user interface to allow a user to configure the settings of the software components.
  • [0006]
    In order to manage the operating system (for example a thin client operating system), an end user should be provided with:
      • several Graphical User Interfaces (or “GUI”) for configuring the computer entity hardware and/or the Operating System (or “OS”) program services,
      • the ability to configure the OS by different means:
        • using a GUI available on the OS,
        • using an existing network management protocol (for example SNMP),
        • using a proprietary network management tool,
      • the ability to extract the OS configuration and to import it on another OS.
  • [0013]
    Any provided program (including the so-called “GUI” programs) for configuring the OS directly can update each software component configuration file and then restart the corresponding software component with the settings based on the configuration chosen by the end user.
  • [0014]
    Then, all provided programs or GUI needing to update a software component have to know:
      • an address of the configuration file of this software component,
      • how this software component should be restarted,
      • and which other dependent software component needs to be updated also.
  • [0018]
    A first difficulty is met in integrating heterogeneous components into an OS. Software components have to be updated or even sometimes be replaced by other software components. Consequently, any program in charge of configuring this software component has to be updated also because configuration files path are deprecated. Software component behaviour could also change. Moreover, usual integrators or administrators may not have access to configuration program sources.
  • [0019]
    A second difficulty is met in centrally managing heterogeneous component settings. Each software component has its own configuration file and several programs could exist to configure one same software component. So each of these programs can have its own way to edit and update one software component configuration file. Moreover, two configuration programs can have access to the same software component configuration file at the same time which can lead to data corruption.
  • [0020]
    A third difficulty is met in handling interactions between all software components. An operating system, in the end, comprises a multiplicity of software components and configuration programs. Because interactions and dependencies between software components can be managed in several places, some software components may be not synchronized with their configuration files. Settings required by an end user may not be applied to all software components.
  • [0021]
    The present invention aims to improve the situation.
  • [0022]
    To this end, it proposes a method for managing data of settings in an operating system of a computer entity.
  • [0023]
    According to the invention, the operating system includes a plurality of sets of specific instructions for managing configurations of the software components intended to run on the computer entity. Therefore, a modification of settings required by an external program involves a modification of a configuration of the software components, through related specific instructions.
  • [0024]
    Furthermore, a repository storing data of settings, and a main program having access to the repository in read and write modes, is provided.
  • [0025]
    Upon request from an external program for modifying settings, the main program is adapted for:
      • transmitting the request to the sets of specific instructions,
      • receiving from at least one of the sets of specific instructions a response including an information of modification of settings required by the external program,
      • upon verification of the information based on at least one criterion, validating said modification of settings and updating related data in the repository.
  • [0029]
    The present invention aims also a computer program, comprising instructions for the implementation of the method, as the aforesaid “main program”. The invention aims also a data storing media, comprising program code instructions of such a computer entity program.
  • [0030]
    In an embodiment, the aforesaid “at least one criterion” is whether the information of modification of settings has a correct type of data.
  • [0031]
    In a same embodiment or in an alternative embodiment, a further verification can be performed on the request itself and may comprise a test of regular expression of the request.
  • [0032]
    In a preferred embodiment, the architecture of the cooperation between the main program and the external programs substantially corresponds to a client/server architecture.
  • [0033]
    Thus, the main program comprises preferably a server program adapted for reading and/or writing data in said repository, while said external programs act as “client” programs.
  • [0034]
    In this preferred embodiment, the main program comprises an application program interface (or “API”) for providing an interface between the client programs and the server program. Advantageously, the application program interface includes a list of possible commands related at least to the reading and writing of the repository. In an embodiment where a buffer is further provided for temporarily storing modification of settings data before updating the repository content, the list of commands may include a confirmation of changing the repository (e.g. a “commit” type command), and also a rollback command.
  • [0035]
    In a specific embodiment, the aforesaid “server” program comprises a daemon type program and each of the sets of specific instructions defines a plugin type program, added to the daemon and being arranged for cooperating with the daemon.
  • [0036]
    It is reminded that a “plugin” is an auxiliary program, interacting with a program (here the daemon) in order to provide new functionalities to that program. More particularly, a plugin comprises code instructions that the program (the daemon) can read and run. It is also reminded that a “DAEMON” (for “Disk And Execution MONitor”) is a program that is not invoked explicitly, but lies “dormant” waiting for at least one condition to occur. An external program, perpetrator of the condition, does not need to be aware that a daemon is present, though often a program will commit an action only because it knows that it will implicitly invoke a daemon. For example, “unix” systems run many daemons, chiefly to handle requests for services from other hosts on a network. Most of these are started as required by a single daemon, rather than running continuously. The daemon according to the invention follows thus the analogy with a client/server architecture.
  • [0037]
    The operating system according to the invention can be advantageously a LINUX® type operating system, and a single repository of settings is further provided for storing all the settings of the software components, making it possible to manage an equivalent of a registry of settings in such a LINUX® type operating system. It is reminded that such a registry of settings is a specific element of a WINDOWS® type operating system, and is not provided however in a usual LINUX® type operating system. Moreover, the repository (storing the settings) can advantageously be a simple XML file.
  • [0038]
    Here, the daemon of the invention is preferably adapted for cooperating with the plugins, as follows:
      • the daemon transmits a request from an external program to the plugins,
      • if one or several plugins are concerned by the content of the request, they answer to the daemon with a response including information of modification of settings according to the request.
  • [0041]
    Therefore, thanks to the implementation of the invention, administrators, integrators and developers have a standard and reliable way of interfacing a software component in an operating system, simply by writing sets of specific instructions (or “plugins” hereafter).
  • [0042]
    By providing their own settings, the plugins provide a virtualization of software component settings management. Configuration programs do not directly change software component settings but only plugin settings. Therefore, such plugins can update software component settings according to their own settings.
  • [0043]
    By providing an intermediate program (the so-called “main program” according to the invention), the invention ensures an exclusive access to data of settings, accorded to the main program. Indeed, in an advantageous embodiment of the invention, the main program has an exclusive access to the settings repository. Thus, any configuration program can have access to settings data only through the main program.
  • [0044]
    Using the main program according to the invention also ensures having only one way to change settings for the operating system.
  • [0045]
    Because each plugin is in charge of a part of the central repository of settings, it is possible to use the main program to centrally manage heterogeneous software components settings through the management of the related plugins' own settings.
  • [0046]
    Moreover, the invention provides a central data repository which makes the operating system configuration available in only one location (for example a memory address), which is well defined.
  • [0047]
    In an embodiment, if several external programs require modifications of common settings, the main program is adapted for notifying these external programs of changes in common parts of the repository. Thus, each software component or associated program is able to know whether it should restart or change its state. Such an embodiment makes it possible to react on any change of settings or a part of settings in the repository. Configuration programs are just in charge of their own configuration settings and do not need to know which software component is in charge of which settings nor which software component has to be updated.
  • [0048]
    Other characteristics and advantages of the invention will become apparent on examining the detailed specification hereafter, and the appended drawings in which:
  • [0049]
    FIG. 1 illustrates an example of the main architecture of the operating system according to the invention, and
  • [0050]
    FIG. 2 illustrates an example of operation of the architecture of FIG. 1, for illustrating steps of the method according to the invention.
  • [0051]
    With reference to FIG. 1, the main program 10, of an operating system according to the invention, comprises:
      • an application program interface (or “API”) 11, receiving from external programs 20,21 a request for changes of settings of software components 35 of the operating system, and
      • a daemon 12 for transmitting this request to plugins 30, 31, 32, 33.
  • [0054]
    In the client/server architecture of FIG. 1, the external programs 20,21 can be considered as client programs and, for example, can be a graphical user interface (or “GUI”) 20.
  • [0055]
    If the requested changes of settings are validated, they are stored in a buffer 40. If they are further confirmed, the settings are then stored in a repository 41, for instance an XML file.
  • [0056]
    In a general embodiment, when the API 11 receives from a client program 20 a request of change of settings, the API 11 checks the request (for example its expression in the test 103 of FIG. 2 described hereafter). If the request is valid, it is transmitted to the daemon 12. The request comprises an indication (a key value and/or a file path) allowing the daemon 12 to know which plugin or plugins may be concerned by the request. The plugins 30-33 are considered as extensions added to the daemon 12. Each plugin comprises a set of instructions which are necessary:
      • to verify the content and the parameters of a request (for example a key value and/or a file format),
      • to redefine key values of a registry (as like a WINDOWS® key registry),
      • to modify the settings of the software components of the operating system that are related to the changes required in the request.
  • [0060]
    One such plugin can be related to settings aiming the desktop configuration (for example a background image of the desktop which appears on the screen). Another such plugin can be related to settings aiming a modem configuration, or any other peripherals. Another such plugin again can be related to any internal settings of the computer entity.
  • [0061]
    When the daemon 12 receives a request from the API, it (12) consults each plugin 30-33 and the plugins concerned by the request are run. To that end, the request may comprise an indication of a file path to one or several “concerned plugins”, for example. More particularly, specific instructions of the concerned plugins can be run in response to a command sent form a client program 20 to the API 11, during their dialogue. Such a command is also indicated in the request sent to the daemon 12.
  • [0062]
    A non exhaustive list may include the following possible commands:
      • “set” (corresponding to a request for checking the validity of changes of settings in a request and for temporarily storing validated data in a buffer 40),
      • “commit” (for confirming changes of key values in a registry corresponding here to the repository 41),
      • “rollback” (the opposite to the “commit” command, to avoid any effective modification of the repository 41),
      • “import” (for importing for example the content of an external repository in the repository 41 of FIG. 1),
      • “export” (for exporting the content of the repository 41 of FIG. 1 in an external repository),
      • “get” (for enabling a client program to know a key value in the repository 41),
      • “apply” (to effectively apply the changes stored in the repository 41 to the software components 35),
      • “watch” (to notify the changes in the repository 41 to the client programs 20,21).
  • [0071]
    When the daemon 12 receives a request from the API with one of the commands given above, it (12) runs the instructions related to that command, those instructions being contained in the “concerned plugins”. For example, if a request comprises the command “set” and asks for a modification of a background image in a desktop configuration. The daemon 12 runs a plugin related to the desktop configuration and, more particularly, a set of instructions of this plugin specifically to answer to the command “set”. The daemon, running the specific instructions of the “desktop plugin”, may for example:
      • check the format of a new image (intended to replace a former image),
      • check also a new key value in the request, etc.
  • [0074]
    If the result of the checking is positive (meaning that the modifications asked in the request are valid and can be applied), the daemon 12 stores the checked data in the buffer 40 and replies to the API that the modifications can be done.
  • [0075]
    If the daemon receives a request comprising a “commit” command for the same modification of the background image in the desktop configuration, the daemon runs the instructions of the “desktop” plugin related to the “commit” command and stores the key values validated in the buffer 40 in the repository 41.
  • [0076]
    If the daemon receives a request comprising an “apply” command for the same modification of the background image in the desktop configuration, the daemon runs the instructions of the “desktop” plugin related to the “apply” command for modifying effectively the settings of the software components 35.
  • [0077]
    Therefore, the API 11 is provided for the client programs 20,21 to communicate with the daemon 12. The API provides also a way for a client program, or a group of client programs 20,21, to be notified of changes in selected parts of the repository 41. The API includes a reduced set of commands to easily comply with the software implementation of the main program 10.
  • [0078]
    Moreover, the content of a request can be checked by the API 11 with a regular expression test (“RegExp”) in order to validate or reject data of the request. The “RegExp” evaluation must be successful for allowing any setting to be written into the buffer 40. In case of rejection, a mechanism can be provided to supply a default data or an adapted data.
  • [0079]
    Requests of settings are stored in the volatile buffer 40 before being committed to the repository 41. Therefore, a rollback (command “Rollback”) is possible until modifications are effectively committed (command “Commit”). “Rollback” and “Commit” commands can be done on one setting or on a group of settings.
  • [0080]
    The notification mechanism (answer to a “Watch” command) is preferably based on a “TCP socket” application (for “Transmission Control Protocol”). The daemon runs locally like a server and listens for socket access. It can be used also remotely by third party software (for instance Altiris™ or any other asset management tool).
  • [0081]
    Only one client program 20, at a time, can access the settings in the repository 41 via the API 11. In the example of FIG. 1, the client program 21 shall wait (dashed line between boxes 21 and 11) for the end of process of the request sent by the client program 20.
  • [0082]
    The API 11 can be compiled in C++, C or Bash language.
  • [0083]
    The daemon 12 has an exclusive access to the repository 41, to read and write its content, through a “default” plugin 33 (noted pl-n on FIG. 1). The default plugin 33 cooperates with the main program 10 (API and daemon) and is provided in particular for managing changes in the buffer 40 or in the repository 41.
  • [0084]
    Practically, such a “default” plugin 33 can be simply a routine contained in the daemon 12 itself. However, implementing a separate plugin for managing changes in the buffer and, more particularly, in the repository, may be more advantageous in order to control the operation of the main program according to the invention and its plugins. Moreover, the specific instructions to run for answering different requests can be gathered in a same plugin or in distinct plugins. The gathering of the sets of instructions per plugins can be controlled according to an optimum of operation of the operating system or according to a particular choice of an administrator of the operating system.
  • [0085]
    The plugins 30-32 are in charge of updating the operating system and its software components 35. A first function of the daemon 12 is to provide support for the plugins 30-32.
  • [0086]
    The plugins are made of a shared library (for instance a “.so” file of a dynamic library) and, advantageously, include a set of default settings 33 (for instance an XML file). The common plugins 30-32 implement a specific interface to be compliant with the main program 10. The default plugin 33 can be used as an interpreter of self made script based plugins. The default plugin 33 can be used each time default settings are used and no other processing is needed. This avoids the need to develop executable binary plugins for simple cases of default settings. In more general terms, a predetermined set of settings is further provided with the plugins for defining default settings of the software components 35.
  • [0087]
    Plugins can override any API command in order to change the default behaviour of the API. The plugins thus provide an interface between the settings of the repository 41 and the configuration of the related software components 35, for instance, for creating a configuration file or for restarting programs (as it will be described in more detail further in the present specification). To ease the management of configuration files of the software component 35, templates can be provided in an additional library. For instance, templates of the type “smb.conf.in” can be processed to generate a final library smb.conf. The templates can be customized in order to modify generated files without modifying executable parts of the related plugins. The templates provide for example keywords to access registry values and/or conditional tests.
  • [0088]
    Access rights can be associated to the settings in the repository 41. At least a part of the content of the repository 41 can include settings preferred by a first identified user of the computer entity running the OS of the invention, while access to this part of the repository is disabled for another user (having for example lower access rights).
  • [0089]
    The settings chosen by a user are preferably stored in a non-volatile memory of the computer entity, while at least current settings of computer entity components (for example peripherals) are preferably stored in a volatile memory.
  • [0090]
    With reference now to FIG. 2, a request for changing settings in the operating system is sent by a client program (step 101) and received by the API (step 102). A test (step 103) for checking the validity of the request is performed (for example a RegExp type test, and other possible tests described later on). If the request is not valid (arrow N from test 103), the request is rejected. Otherwise (arrow Y from test 103), the request 101 is valid and its content is sent to the daemon program (step 104) which broadcasts the request to the plugins (step 105). As it will be described in detail in an example of implementation hereafter, the request comprises a key (for example, in some cases, a file path leading to the concerned plugins) for enabling the concerned plugins to reply to the daemon. Amongst the plugins, the default plugin pl-n can be considered as the plugin which can be used for managing any modification in the buffer 40 or in the repository 41. The plugin pl-n temporarily stores the required change of settings in the buffer 40 (step 106). The main program 10 (through the API 11) asks the user (through the client program 20) a confirmation for executing the request (“commit” command and test 107 of FIG. 2). If the execution of the request is indeed wished (arrow Y from test 107), the key values of the repository 41, at least, are replaced by the key values stored in the buffer 40 (step 108). Otherwise (arrow N from test 107), the dialogue between the API 11 and the client program 20 may continue with a message of abandonment sent by the API 11 (which situation may correspond to a “rollback” command).
  • [0091]
    Upon an “apply” command (step 109), the settings defined in the repository 41 are finally applied to the concerned software components (step 110), by reloading configuration files of the software components or, alternatively, by restarting them (depending on the mode of modification of each software components). Otherwise (arrow N from test 109), the main program 10 may wait for an appropriate moment for applying the required changes.
  • [0092]
    An example of implementation of the invention is given below, in an application for managing settings related to a desktop “look and feel” of a screen display of a computer unit.
  • [0093]
    A plugin related to the desktop settings is provided, according to the invention, and is able to cooperate with a daemon 12. This plugin is a program designed to be globally compliant with the main program 10 of the invention. Its goal is to manage every setting related to desktop look and feel (image, icons, etc). It is provided with its own default settings, for example according to a simple routine or “default key” comprising the following instructions:
      • os/desktop/background
        • value=/etc/default.jpg
        • type=string
        • RegExp=
  • [0098]
    In this example, the client program 20 is a proprietary graphical user interface (GUI) designed to allow the user to change desktop settings. Using a control-panel client program, the user selects a new background image path with a file browser widget. While cooperating with the API 11, the control-panel program tries to propose new values for the desktop background, for example a desktop plugin background key, such as:
      • set os/desktop/background new-image.jpg
  • [0100]
    The “set” request, through a TCP type protocol, reaches the daemon program 12. As a server, the daemon 12 broadcasts the request to all the plugin programs 30-33.
  • [0101]
    At least one of these plugins and more particularly a desktop plugin (called through the key “os/desktop/background”) preferably checks the key, for example with the following tests:
      • “does the file exist?”
      • “does the jpg image have a valid size?”
  • [0104]
    If the desktop plugin (carrying for example the reference 30 of FIG. 1) rejects the key modification, it sends back an error code. The API 11 informs the client program 20 of the rejection (through the aforesaid “control panel” program). If the desktop plugin 30 accepts the change of settings, the “set” request is sent to a next plugin 31, until the last plugin pl-n. Preferably, the last plugin (reference 33 of FIG. 1) is a “default” plugin. The default plugin adds the “set” request to the registry buffer 40. Then, an “acknowledge of receipt” of the request is sent to the GUI 20 (during a dialogue between the API 11 and the client program 20). The GUI 20 then knows that the value entered by the user is correct and that the request can be committed. While cooperating with the API 11, the GUI 20 can commit the previous key, slightly modified:
      • commit os/desktop/background new-image.jpg
  • [0106]
    The daemon 12 broadcasts the commit request to all the plugins 30-33. The commit request arrives to the default plugin 33 which transfers the key “os/desktop/background” to the buffer 40. The registry buffer 40 contains this key. It updates an XML registry object which automatically gets synchronized with the XML repository file of settings 41.
  • [0107]
    Then, the modified key os/desktop/background is returned to a “Watch Notification” routine which checks whether a client program is watching for changes on its key: “os/desktop/background”. Each client program 20,21 watching for change on this key is then notified consequently.
  • [0108]
    When the command “apply” is executed, the content of the repository 41 is effectively applied to the software components 35 concerned by the new settings. In the example given above, a software component 35 can be a desktop manager.
  • [0109]
    In a first example of embodiment, the desktop manager 35 can be an “open source” program which allows to manage desktop feature such as:
      • desktop background image,
      • desktop icons,
      • desktop start menu.
  • [0113]
    Then, the desktop manager has its own configuration file (desktop.cfg) which contains the desktop manager settings for background, icons and start menu.
  • [0114]
    The user may simply click with his mouse on an icon called “apply settings”. Dialoguing with the API 11, the control panel program asks the desktop plugin 30 for an update of the software components 35 (including the aforesaid desktop manager), which are concerned by the key:
      • apply os/desktop
  • [0116]
    The daemon 12 broadcasts the set request to all plugins and the related desktop plugin 30 aimed in the key: “os/desktop keys” intercepts the apply request. Then, the desktop plugin 30:
      • updates the desktop manager 35 (more particularly the “desktop.cfg” configuration file) with the latest settings stored in the XML Registry Object.
      • asks the desktop manager 35 to reload its configuration file or, alternatively, restarts the desktop manager program.
  • [0119]
    In a second example of an embodiment, to be considered as an alternative to the first example of an embodiment, the desktop manager 35 is intentionally designed as a client program being able to cooperate with the main program 10 according to the invention and more particularly with the daemon 12. The desktop manager, on a start-up, creates a watch request on keys such as:
      • os/desktop/background
      • watch os/desktop/background
  • [0122]
    The daemon 12 broadcasts a watch request to all the plugins. Then, the watched key is added to a “Watch Notification” file containing the information that the desktop manager program is watching for changes on a key:
      • os/desktop/background
  • [0124]
    If any change occurs on the key os/desktop/background, the desktop manager is notified and can withdraw then any current desktop background.
  • [0125]
    Of course, the present invention is not limited to the embodiment described above by way of example. It extends rather to other variants, however within the scope of the claims hereafter.
Citations de brevets
Brevet cité Date de dépôt Date de publication Déposant Titre
US5379427 *9 mars 19903 janv. 1995Mitsubishi Denki Kabushiki KaishaTask tracing apparatus in a multitask operating system
US6536036 *6 avr. 199918 mars 2003International Business Machines CorporationMethod and apparatus for managing code test coverage data
US6678882 *30 juin 199913 janv. 2004Qwest Communications International Inc.Collaborative model for software systems with synchronization submodel with merge feature, automatic conflict resolution and isolation of potential changes for reuse
US6983449 *15 mars 20023 janv. 2006Electronic Data Systems CorporationSystem and method for configuring software for distribution
US7103874 *23 oct. 20035 sept. 2006Microsoft CorporationModel-based management of computer systems and distributed applications
US7278133 *18 avr. 20052 oct. 2007Ntt Docomo, Inc.Index-based parameter access and software for using the same
US7404180 *11 déc. 200322 juil. 2008Sap AgTrace management in client-server applications
US7584382 *13 août 20041 sept. 2009Microsoft CorporationMethod and system for troubleshooting a misconfiguration of a computer system based on configurations of other computer systems
US7594220 *21 juin 200222 sept. 2009National Instruments CorporationConfiguration diagram with context sensitive connectivity
US7631299 *7 janv. 20038 déc. 2009Computer Sciences CorporationSystem for modifying software using reusable software components
US7707278 *20 nov. 200127 avr. 2010University Of SurreyReconfiguration management architectures for mobile communication systems
US7735062 *18 mai 20058 juin 2010Outsystems—Software Em Rede, S.A.Software development system and method
US7739677 *27 mai 200515 juin 2010Symantec Operating CorporationSystem and method to prevent data corruption due to split brain in shared data clusters
US7757211 *3 mai 200413 juil. 2010Jordan Thomas LManaged object member architecture for software defined radio
US7765525 *1 sept. 200427 juil. 2010Intuit Inc.Operations manager infrastructure for dynamically updating software operational policy
US7886278 *12 sept. 20058 févr. 2011Sap AgObject reference monitoring
US7900201 *21 déc. 20051 mars 2011Zenprise, Inc.Automated remedying of problems in software application deployments
US7979840 *31 oct. 200612 juil. 2011International Business Machines CorporationMethod and apparatus for service-oriented architecture process decomposition and service modeling
US8151247 *8 oct. 20073 avr. 2012Sap AgTest data management
US8181157 *29 sept. 200615 mai 2012Rockwell Automation Technologies, Inc.Custom language support for project documentation and editing
Citations hors brevets
Référence
1 *Friedrich et al, "Mata data version and configuration management in multi vendor environments", ACM SIGMOD, pp 799-804, 2005
2 *Gonzalez et al, "Google fusion tables: web centred data management and collaboration", ACM SIGMOD, pp 1061-1066, 2010
3 *Song et al, "A case for scaling applications to many core with OS clustering", ACM EuroSys, pp 61-75, 2011
4 *Xing et al, "The testing and evaluating system for the secure operating system based on the mechanism of keyword driven", IEEE, pp 471-474, 2009
Référencé par
Brevet citant Date de dépôt Date de publication Déposant Titre
US7971049 *31 mars 200828 juin 2011Symantec CorporationSystems and methods for managing user configuration settings
US7975084 *6 févr. 20085 juil. 2011American Megatrends, Inc.Configuring a host computer using a service processor
US907567829 août 20117 juil. 2015Hewlett-Packard Development Company, L.P.Client and server for installation of files embedded within a client profile
US9396160 *28 févr. 201319 juil. 2016Amazon Technologies, Inc.Automated test generation service
US9436725 *28 févr. 20136 sept. 2016Amazon Technologies, Inc.Live data center test framework
US9444717 *28 févr. 201313 sept. 2016Amazon Technologies, Inc.Test generation service
US9485207 *30 oct. 20131 nov. 2016Intel CorporationProcessing of messages using theme and modality criteria
US9569205 *10 juin 201314 févr. 2017Symantec CorporationSystems and methods for remotely configuring applications
US9571561 *27 déc. 201314 févr. 2017Samsung Sds Co., Ltd.System and method for dynamically expanding virtual cluster and recording medium on which program for executing the method is recorded
US9787618 *17 déc. 201310 oct. 2017Samsung Electronics Co., Ltd.Content-centric network communication method and apparatus
US20090249051 *31 mars 20081 oct. 2009Tengaio LanceSystems and methods for managing user configuration settings
US20140181226 *17 déc. 201326 juin 2014Samsung Electronics Co., Ltd.Content-centric network communication method and apparatus
US20140189109 *27 déc. 20133 juil. 2014Samsung Sds Co., Ltd.System and method for dynamically expanding virtual cluster and recording medium on which program for executing the method is recorded
US20160182298 *18 déc. 201423 juin 2016International Business Machines CorporationReliability improvement of distributed transaction processing optimizations based on connection status
Classifications
Classification aux États-Unis717/121
Classification internationaleG06F9/44
Classification coopérativeG06F9/44505
Classification européenneG06F9/445C
Événements juridiques
DateCodeÉvénementDescription
4 oct. 2007ASAssignment
Owner name: NEOWARE, INC., PENNSYLVANIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CLEMENCEAU, MATTHIEU;LEDOUX, EMMANUEL;STEPHANE, DURAND;REEL/FRAME:019918/0444
Effective date: 20070918
25 oct. 2007ASAssignment
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, TEXAS
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NEOWARE, INC.;REEL/FRAME:020015/0281
Effective date: 20071008
19 févr. 2013CCCertificate of correction
29 déc. 2015FPAYFee payment
Year of fee payment: 4